لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following job roles would sponsor data quality and data entry initiatives that ensure business and regulatory requirements are met?
A. The data owner
B. The data processor
C. The data steward
D. The data privacy officer
عرض الإجابة
اجابة صحيحة: AD
السؤال #2
An organization has implemented a two-step verification process to protect user access to data that 6 stored in the could Each employee now uses an email address of mobile number a code to access the data. Which of the following authentication methods did the organization implement?
A. Token key
B. Static code
C. Push notification
D. HOTP
عرض الإجابة
اجابة صحيحة: BF
السؤال #3
To mitigate the impact of a single VM being compromised by another VM on the same hypervisor, an administrator would like to utilize a technical control to further segregate the traffic. Which of the following solutions would BEST accomplish this objective?
A. Install a hypervisor firewall to filter east-west traffic
B. Add more VLANs to the hypervisor network switches
C. Move exposed or vulnerable VMs to the DMZ
D. Implement a zero-trust policy and physically segregate the hypervisor servers
عرض الإجابة
اجابة صحيحة: A
السؤال #4
An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?
A. Document the collection and require a sign-off when possession changes
B. Lock the device in a safe or other secure location to prevent theft or alteration
C. Place the device in a Faraday cage to prevent corruption of the data
D. Record the collection in a blockchain-protected public ledger
عرض الإجابة
اجابة صحيحة: A
السؤال #5
After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?
A. The vulnerability scan output
B. The IDS logs
C. The full packet capture data
D. The SIEM alerts
عرض الإجابة
اجابة صحيحة: A
السؤال #6
A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst reviews the following SIEM log: Which of the following describes the method that was used to compromise the laptop?
A. An attacker was able to move laterally from PC1 to PC2 using a pass-the-hash attack
B. An attacker was able to bypass application whitelisting by emailing a spreadsheet attachment with an embedded PowerShell in the file
C. An attacker was able to install malware to the CAasdf234 folder and use it to gam administrator nights and launch Outlook
D. An attacker was able to phish user credentials successfully from an Outlook user profile
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A systems analyst is responsible for generating a new digital forensics chain-of-custody form Which of the following should the analyst Include in this documentation? (Select TWO).
A. The order of volatility
B. A checksum
C. The location of the artifacts
D. The vendor's name
E. The date and time
F. A warning banner
عرض الإجابة
اجابة صحيحة: AE
السؤال #8
A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee’s hard disk. Which of the following should the administrator use?
A. dd
B. chmod
C. dnsenum
D. logger
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A security engineer is reviewing log files after a third discovered usernames and passwords for the organization’s accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?
A. Man-in- the middle
B. Spear-phishing
C. Evil twin
D. DNS poising
عرض الإجابة
اجابة صحيحة: C
السؤال #10
A security assessment determines DES and 3DES at still being used on recently deployed production servers. Which of the following did the assessment identify?
A. Unsecme protocols
B. Default settings
C. Open permissions
D. Weak encryption
عرض الإجابة
اجابة صحيحة: D
السؤال #11
A security researcher has alerted an organization that its sensitive user data was found for sale on a website. Which of the following should the organization use to inform the affected parties?
A. An incident response plan
B. A communications plan
C. A business continuity plan
D. A disaster recovery plan
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?
A. Semi-authorized hackers
B. State actors
C. Script kiddies
D. Advanced persistent threats
عرض الإجابة
اجابة صحيحة: D
السؤال #13
An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?
A. HSM
B. CASB
C. TPM
D. DLP
عرض الإجابة
اجابة صحيحة: B
السؤال #14
The spread of misinformation surrounding the outbreak of a novel virus on election day ted to eligible voters choosing not to take the risk of going to the polls This is an example of:
A. prepending
B. an influence campaign
C. a watering-hole attack
D. intimidation
E. information elicitation
عرض الإجابة
اجابة صحيحة: C
السؤال #15
A financial analyst has been accused of violating the company’s AUP and there is forensic evidence to substantiate the allegation. Which of the following would dispute the analyst’s claim of innocence?
A. Legal hold
B. Order of volatility
C. Non-repudiation
D. Chain of custody
عرض الإجابة
اجابة صحيحة: D
السؤال #16
A host was infected with malware. During the incident response, Joe, a user, reported that he did not receive any emails with links, but he had been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?
A. The DNS logs
B. The web server logs
C. The SIP traffic logs
D. The SNMP logs
عرض الإجابة
اجابة صحيحة: C
السؤال #17
An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?
A. SOU attack
B. DLL attack
C. XSS attack
D. API attack
عرض الإجابة
اجابة صحيحة: A
السؤال #18
An organization relies on third-party video conferencing to conduct daily business. Recent security changes now require all remote workers to utilize a VPN to corporate resources. Which of the following would BEST maintain high-quality video conferencing while minimizing latency when connected to the VPN?
A. Using geographic diversity to have VPN terminators closer to end users
B. Utilizing split tunneling so only traffic for corporate resources is encrypted
C. Purchasing higher-bandwidth connections to meet the increased demand
D. Configuring QoS properly on the VPN accelerators
عرض الإجابة
اجابة صحيحة: D
السؤال #19
A company is upgrading its wireless infrastructure to WPA2-Enterprise using EAP-TLS. Which of the following must be part of the security architecture to achieve AAA? (Select TWO)
A. DNSSEC
B. Reverse proxy
C. VPN concentrator
D. PKI
E. Active Directory
F. RADIUS
عرض الإجابة
اجابة صحيحة: A
السؤال #20
A network administrator at a large organization Is reviewing methods to improve the security of the wired LAN Any security improvement must be centrally managed and allow corporate-owned devices to have access to the intranet but limit others to Internet access only. Which of the following should the administrator recommend?
A. 802
B. SSO to authenticate corporate users
C. MAC address filtering with ACLs on the router
D. PAM for user account management
عرض الإجابة
اجابة صحيحة: D
السؤال #21
An incident, which is affecting dozens of systems, involves malware that reaches out to an Internet service for rules and updates. The IP addresses for the Internet host appear to be different in each case. The organization would like to determine a common IoC to support response and recovery actions. Which of the following sources of information would BEST support this solution?
A. Web log files
B. Browser cache
C. DNS query logs
D. Antivirus
عرض الإجابة
اجابة صحيحة: C
السؤال #22
In which of the following common use cases would steganography be employed?
A. Obfuscation
B. Integrity
C. Non-repudiation
D. Blockchain
عرض الإجابة
اجابة صحيحة: D
السؤال #23
A small business office is setting up a wireless infrastructure with primary requirements centered around protecting customer information and preventing unauthorized access to the business network. Which of the following would BEST support the office's business needs? (Select TWO)
A. Installing WAPs with strategic placement
B. Configuring access using WPA3
C. Installing a WIDS
D. Enabling MAC filtering
E. Changing the WiFi password every 30 days
F. Reducing WiFi transmit power throughout the office
عرض الإجابة
اجابة صحيحة: BD
السؤال #24
An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up. The ClO is also concerned about the organization's security and customer privacy. Which of the following would be BEST to address the ClO’s concerns?
A. Disallow new hires from using mobile devices for six months
B. Select four devices for the sales department to use in a CYOD model
C. Implement BYOD for the sates department while leveraging the MDM
D. Deploy mobile devices using the COPE methodology
عرض الإجابة
اجابة صحيحة: EF
السؤال #25
Following a prolonged datacenter outage that affected web-based sales, a company has decided to move its operations to a private cloud solution. The security team has received the following requirements: ? There must be visibility into how teams are using cloud-based services. ? The company must be able to identify when data related to payment cards is being sent to the cloud. ? Data must be available regardless of the end user's geographic location ? Administrators need a single pane-of-glass view into tra
A. Create firewall rules to restrict traffic to other cloud service providers
B. Install a DLP solution to monitor data in transit
C. Implement a CASB solution
D. Configure a web-based content filter
عرض الإجابة
اجابة صحيحة: AC
السؤال #26
The process of passively gathering information prior to launching a cyberattack is called:
A. tailgating
B. reconnaissance
C. pharming
D. prepending
عرض الإجابة
اجابة صحيحة: D
السؤال #27
After installing a Windows server, a cybersecurity administrator needs to harden it, following security best practices. Which of the following will achieve the administrator's goal? (Select TWO).
A. Disabling guest accounts
B. Disabling service accounts
C. Enabling network sharing
D. Disabling NetBIOS over TCP/IP
E. Storing LAN manager hash values
F. Enabling NTLM
عرض الإجابة
اجابة صحيحة: A
السؤال #28
A company is setting up a web server on the Internet that will utilize both encrypted and unencrypted web-browsing protocols. A security engineer runs a port scan against the server from the Internet and sees the following output: Which of the following steps would be best for the security engineer to take NEXT?
A. Allow DNS access from the internet
B. Block SMTP access from the Internet
C. Block HTTPS access from the Internet
D. Block SSH access from the Internet
عرض الإجابة
اجابة صحيحة: B
السؤال #29
A cloud administrator is configuring five compute instances under the same subnet in a VPC Three instances are required to communicate with one another, and the other two must he logically isolated from all other instances in the VPC. Which of the following must the administrator configure to meet this requirement?
A. One security group
B. Two security groups
C. Three security groups
D. Five security groups
عرض الإجابة
اجابة صحيحة: B
السؤال #30
A security analyst is reviewing logs on a server and observes the following output: Which of the following is the security analyst observing?
A. A rainbow table attack
B. A password-spraying attack
C. A dictionary attack
D. A keylogger attack
عرض الإجابة
اجابة صحيحة: B
السؤال #31
A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The security administrator isolated the switch on a separate VLAN and set up a patch routine. Which of the following steps should also be taken to harden the smart switch?
A. Set up an air gap for the switch
B. Change the default password for the switch
C. Place the switch In a Faraday cage
D. Install a cable lock on the switch
عرض الإجابة
اجابة صحيحة: B
السؤال #32
Joe. a security analyst, recently performed a network discovery to fully understand his organization's electronic footprint from a "public" perspective. Joe ran a set of commands and received the following output: Which of the following can be determined about the organization's public presence and security posture? (Select TWO).
A. Joe used Who is to produce this output
B. Joe used cURL to produce this output
C. Joe used Wireshark to produce this output
D. The organization has adequate information available in public registration
E. The organization has too much information available in public registration
F. The organization has too little information available in public registration
عرض الإجابة
اجابة صحيحة: D
السؤال #33
A network technician is installing a guest wireless network at a coffee shop. When a customer purchases an Item, the password for the wireless network is printed on the recent so the customer can log in. Which of the following will the technician MOST likely configure to provide the highest level of security with the least amount of overhead?
A. WPA-EAP
B. WEP-TKIP
C. WPA-PSK
D. WPS-PIN
عرض الإجابة
اجابة صحيحة: D
السؤال #34
A new vulnerability in the SMB protocol on the Windows systems was recently discovered, but no patches are currently available to resolve the issue. The security administrator is concerned tf servers in the company's DMZ will be vulnerable to external attack; however, the administrator cannot disable the service on the servers, as SMB is used by a number of internal systems and applications on the LAN. Which of the following TCP ports should be blocked for all external inbound connections to the DMZ as a wo
A. 135
B. 139
C. 143
D. 161
E. 443
F. 445
عرض الإجابة
اجابة صحيحة: D
السؤال #35
Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?
A. The document is a honeyfile and is meant to attract the attention of a cyberintruder
B. The document is a backup file if the system needs to be recovered
C. The document is a standard file that the OS needs to verify the login credentials
D. The document is a keylogger that stores all keystrokes should the account be compromised
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: